Sciweavers

1788 search results - page 85 / 358
» Integrating Security into the Curriculum
Sort
View
SAS
2004
Springer
132views Formal Methods» more  SAS 2004»
15 years 5 months ago
Modular and Constraint-Based Information Flow Inference for an Object-Oriented Language
Abstract. This paper addresses the problem of checking programs written in an object-oriented language to ensure that they satisfy the information flow policies, confidentiality ...
Qi Sun, Anindya Banerjee, David A. Naumann
DELTA
2008
IEEE
15 years 1 months ago
On Using Fingerprint-Sensors for PIN-Pad Entry
Automatic fingerprint authentication is an integral part in many security systems. Because not every person is always suited to that technology, a general purpose security system ...
Marcel Jacomet, Josef Goette, Andreas Eicher
ICICS
2010
Springer
14 years 10 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
DATE
2006
IEEE
109views Hardware» more  DATE 2006»
15 years 6 months ago
A secure scan design methodology
It has been proven that scan path is a potent hazard for secure chips. Scan based attacks have been recently demonstrated against DES or AES and several solutions have been presen...
David Hély, Frédéric Bancel, ...
WCE
2007
15 years 1 months ago
Secure Multicarrier Modem on FPGA
— The paper deals with the design and realization of a secure multicarrier modem on FPGA. The crypto-modem principle is adopted. An encryption block is integrated in the modem tr...
Galia Marinova, Vassil Guliashki, Didier Le Ruyet,...